Secure Smart Poster

Gallo; Francesco ;   et al.

Patent Application Summary

U.S. patent application number 13/358362 was filed with the patent office on 2012-08-16 for secure smart poster. This patent application is currently assigned to NXP B.V.. Invention is credited to Francesco Gallo, Christian Michael Lesjak.

Application Number20120207305 13/358362
Document ID /
Family ID44140774
Filed Date2012-08-16

United States Patent Application 20120207305
Kind Code A1
Gallo; Francesco ;   et al. August 16, 2012

SECURE SMART POSTER

Abstract

A smart poster system is provided, which includes a smart poster comprising an NFC device, a mobile device for communicating with the NFC device, and a server unit for providing content to the mobile device, wherein the NFC device is arranged to provide the mobile device with an address of the server unit, the address comprising a counter value, which counter value represents the number of executed read accesses to the NFC device. Also, a method for providing a secure communication channel between a mobile device and a server unit in a smart poster system is conceived, wherein the smart poster system comprises an NFC device for providing the mobile device with an address of the server unit, and wherein the NFC device, upon generating the address, incorporates a counter value into the address, the counter value representing the number of executed read accesses to the NFC device. Thereby, the authenticity of both the NFC device and the server unit is ensured.


Inventors: Gallo; Francesco; (Graz, AT) ; Lesjak; Christian Michael; (Semriach, AT)
Assignee: NXP B.V.
Eindhoven
NL

Family ID: 44140774
Appl. No.: 13/358362
Filed: January 25, 2012

Current U.S. Class: 380/271 ; 455/41.1
Current CPC Class: H04W 4/80 20180201; H04L 61/00 20130101; H04L 63/0492 20130101; H04L 67/02 20130101; G06Q 10/10 20130101; G06F 16/00 20190101
Class at Publication: 380/271 ; 455/41.1
International Class: H04B 5/00 20060101 H04B005/00; H04K 1/00 20060101 H04K001/00

Foreign Application Data

Date Code Application Number
Feb 10, 2011 EP 11154072.0

Claims



1. A smart poster system comprising: a smart poster comprising an NFC device, a mobile device for communicating with the NFC device, a server unit for providing content to the mobile device, wherein the NFC device is arranged to provide the mobile device with an address of the server unit, the address comprising a counter value, which counter value represents the number of executed read accesses to the NFC device.

2. A smart poster system as claimed in claim 1, wherein the address further comprises an identifier value of the NFC device.

3. A smart poster system as claimed in claim 2, wherein the address further comprises a message authentication code calculated over the counter value and the identifier value of the NFC device.

4. A smart poster system as claimed in claim 1, wherein the server unit is a remote server on the internet and the address is an internet address represented by a uniform resource locator.

5. A smart poster system as claimed in claim 1, wherein the address is signed with a digital signature.

6. A smart poster system as claimed in claim 1, wherein the NFC device is arranged to prevent further read access to its data if the counter value has reached a predetermined threshold.

7. A smart poster system as claimed in claim 1, wherein the mobile device is arranged to verify the authenticity of the server unit by: hashing an encrypted counter value received from the server unit, comparing the hashed encrypted counter value received from the server unit with a hashed encrypted counter value received from the NFC device, and if the encrypted counter value received from the server unit is equal to the encrypted counter value received by the NFC device, concluding that the server unit is authentic, and otherwise, that the server unit is not authentic.

8. A method for providing a secure communication channel between a mobile device and a server unit in a smart poster system, wherein the smart poster system comprises an NFC device for providing the mobile device with an address of the server unit, and wherein the NFC device, upon generating the address, incorporates a counter value into the address, the counter value representing the number of executed read accesses to the NFC device.

9. A method as claimed in claim 8, wherein the NFC device further incorporates an identifier value of the NFC device into the address.

10. A method as claimed in claim 9, wherein the NFC device further incorporates a message authentication code (MAC) calculated over the counter value and the identifier value of the NFC device into the address.

11. A method as claimed in claim 8, wherein the server unit is a remote server on the internet and the address is an internet address represented by a uniform resource locator.

12. A method as claimed in claim 8, wherein the NFC device signs the address with a digital signature.

13. A method as claimed in claim 8, wherein the NFC device prevents further read access to its data if the counter value has reached a predetermined threshold.

14. A method as claimed in claim 8, wherein the mobile device verifies the authenticity of the server unit by: hashing an encrypted counter value received from the server unit, comparing the hashed encrypted counter value received from the server unit with a hashed encrypted counter value received from the NFC device, and if the encrypted counter value received from the server unit is equal to the encrypted counter value received by the NFC device, concluding that the server unit is authentic, and otherwise, that the server unit is not authentic.
Description



FIELD OF THE INVENTION

[0001] The invention relates to a smart poster system. The invention further relates to a method for providing a secure communication channel between a mobile device and a server unit in a smart poster system.

BACKGROUND OF THE INVENTION

[0002] Identification products, such as smart cards and RFID tags, are widely used in fields such as transport (ticketing, road tolling, baggage tagging), finance (debit and credit cards, electronic purse, merchant card), communications (SIM card for GSM phone), and tracking (access control, inventory management, asset tracking). RFID is an acronym of radio frequency identification. International standard ISO14443A is the industry standard for contactless smart cards. ISO14443A-compliant products such as MIFARE provide RF communication technology for transmitting data between a card or tag and a reader device. For example, in electronic ticketing for public transport, travelers wave their card over a reader at the turnstiles or entry point, benefiting from improved convenience and speed in the ticketing process. Such products are said to be the key to individual mobility in the future, supporting multiple applications including road tolling, airline tickets, access control and many more.

[0003] Evolving from a combination of contactless identification and networking technologies, near field communication (NFC) is a very short-range wireless technology, for distances measured in centimeters. NFC has been described on the website http://www.nxp.com/nfc and in the standard ISO/IEC 18092. NFC technology is optimized for intuitive, easy and secure communication between various devices without the need for manual configuration by a user. In order to make two devices communicate, users bring them close together or make them touch. The devices comprise NFC interfaces that will automatically connect and configure themselves to form a peer-to-peer network. NFC can also bootstrap other protocols like Bluetooth or wireless Ethernet (Wi-Fi) by exchanging configuration and session data. NFC is compatible with contactless smart card platforms. This enables NFC devices to read information from these cards, making contactless smart cards the ideal solution for bringing information and vouchers into the NFC world. NFC devices can also operate like a contactless card or tag, which makes them compatible with the existing infrastructure of ISO14443A-compliant systems.

[0004] The NFC Forum (http://www.nfc-forum.org/) is a non-profit industry association which promotes the use of NFC short-range wireless interaction in the fields of consumer electronics, mobile devices and personal computers. The NFC Forum promotes the implementation and standardization of NFC technology to ensure interoperability between devices and services.

[0005] A typical example of an NFC Forum use case is the so-called Smart Poster application. A poster or billboard may be equipped with a tag which can be touched, for example, with a mobile device, such as a mobile phone, in order to read out application data stored on the tag. The application data stored on the tag may, for example, comprise the address of the website of a concert advertized by the smart poster. In this case the mobile device may open a browser window and connect to the internet to access the website. In addition, the application data may comprise a digital signature which allows the mobile device to check the authenticity and integrity of the data.

[0006] In the terminology of the NFC Forum the tag is referred to as a NFC Forum Tag and the mobile device is referred to as a NFC Forum Device. More information about the NFC Forum Tag and the NFC Forum device can be found in the following documents, which are accessible via http://www.nfc-forum.org:

[0007] NFC Forum Type Tags, White Paper V1.0, NXP Semiconductors, published on 1 Apr. 2009

[0008] Smart Poster Record Type Definition, Technical Specification, NFC Forum, SPR 1.1, Jul. 24, 2006

[0009] Signature Record Type Definition, Candidate Technical Specification, NFC Forum, NFCForum-TS-Signature_RTD-1.0_draft_14

[0010] Text Record Type Definition, Technical Specification, NFC Forum, RTD-Text 1.0, Jul. 24, 2006

[0011] URI Record Type Definition, Technical Specification, NFC Forum, RTD-URI 1.0, Jul. 24, 2006

[0012] The use of digital signatures on NFC tags in order to ensure authenticity and integrity of data has been discussed in the paper "Digital Signatures on NFC Tags", a Master of Science Thesis from Markus Kith's, School of Information and Communication Technology from the Royal Institute of Technology in Stockholm, published on 18 Mar. 2009 and accessible via http://wvvw.kth.se/. In particular, this paper evaluates the feasibility of digital signatures on NFC tags.

[0013] US 2010/161410 (A1), entitled "Smart Poster" and published on 24 Jun. 2010, discloses that content downloadable from a smart poster is managed remotely at a server. The content data is monitored and usage data of the smart poster is analyzed at the server via an NFC-enabled telecommunications device that is mounted behind a touch point of the smart poster. For this purpose a processor is provided which is arranged to communicate details of transactions between the NFC-enabled telecommunications device and a mobile device to the remote server via a network. The logging of transactions between the smart poster and the mobile device allows the usage of the smart poster to be monitored, in that, for example, the server may be arranged to interrogate the processor and to generate an alarm signal if a response other than the expected response is received. In this way tampering with the NFC-enabled device can be detected. However, there still exists a need to improve the security of use of smart poster applications of the kind set forth.

SUMMARY OF THE INVENTION

[0014] It is an object of the invention to improve the security of use of smart poster applications of the kind set forth. This is achieved by a smart poster system in accordance with claim 1 and by a method for providing a secure communication channel between a mobile device and a server unit in a smart poster system, in accordance with claim 8.

[0015] According to an aspect of the invention a smart poster system is provided, which includes a smart poster comprising an NFC device, a mobile device for communicating with the NFC device, and a server unit for providing content to the mobile device, wherein the NFC device is arranged to provide the mobile device with an address of the server unit, the address comprising a counter value, which counter value represents the number of executed read accesses to the NFC device. In this way the address of the server unit is no longer static, but includes a parameter which changes during use of the tag. This prevents undesired reuse of the address by copying it to another NFC device, for example.

[0016] According to another aspect of the invention the address further comprises an identifier value of the NFC device.

[0017] According to yet another aspect of the invention the address further comprises a message authentication code calculated over the counter value and the identifier value of the NFC device. In this way, it is ensured that each read of the NFC device by a mobile device yields a unique address for accessing content on the server unit.

[0018] According to yet another aspect of the invention, the server unit is a remote server on the internet and the address is an internet address represented by a uniform resource locator.

[0019] According to yet another aspect of the invention, the address is signed with a digital signature.

[0020] According to yet another aspect of the invention, the NFC device is arranged to prevent further read access to its data if the counter value has reached a predetermined threshold. In this way the number of accesses to content on the server unit can be limited in a relatively simple way.

[0021] According to yet another aspect of the invention, the mobile device is arranged to verify the authenticity of the server unit by hashing an encrypted counter value received from the server unit, comparing the hashed encrypted counter value received from the server unit with a hashed encrypted counter value received from the NFC device, and if the encrypted counter value received from the server unit is equal to the encrypted counter value received by the NFC device, concluding that the server unit is authentic, and otherwise, that the server unit is not authentic.

[0022] According to an aspect of the invention a method for providing a secure communication channel between a mobile device and a server unit in a smart poster system is conceived, wherein the smart poster system comprises an NFC device for providing the mobile device with an address of the server unit, and wherein the NFC device, upon generating the address, incorporates a counter value into the address, the counter value representing the number of executed read accesses to the NFC device. In this way the address of the server unit is no longer static, but includes a parameter which changes during use of the tag. This prevents undesired reuse of the address by copying it to another NFC device, for example.

[0023] According to another aspect of the invention, the NFC device further incorporates an identifier value of the NFC device into the address.

[0024] According to yet another aspect of the invention, the NFC device further incorporates a message authentication code calculated over the counter value and the identifier value of the NFC device into the address. In this way, it is ensured that each read of the NFC device by a mobile device yields a unique address for accessing content on the server unit.

[0025] According to yet another aspect of the invention, the server unit is a remote server on the internet and the address is an internet address represented by a uniform resource locator.

[0026] According to yet another aspect of the invention, the NFC device signs the address with a digital signature.

[0027] According to yet another aspect of the invention, the NFC device prevents further read access to its data if the counter value has reached a predetermined threshold. In this way the number of accesses to content on the server unit can be limited in a relatively simple way.

[0028] According to yet another aspect of the invention, the mobile device verifies the authenticity of the server unit by hashing an encrypted counter value received from the server unit, comparing the hashed encrypted counter value received from the server unit with a hashed encrypted counter value received from the NFC device, and if the encrypted counter value received from the server unit is equal to the encrypted counter value received by the NFC device, concluding that the server unit is authentic, and otherwise, that the server unit is not authentic.

BRIEF DESCRIPTION OF THE DRAWINGS

[0029] The invention will be described in more detail with reference to the appended drawings, in which:

[0030] FIG. 1 shows an embodiment of an NFC device in accordance with the invention;

[0031] FIG. 2 illustrates a process of reading an NFC device in order to establish a secure and authenticated communication channel between a mobile device and a server unit in a smart poster system according to the invention.

DESCRIPTION OF PREFERRED EMBODIMENTS

[0032] FIG. 1 shows an embodiment of an NFC device in accordance with the invention. According to this embodiment, the NFC device is the NFC Forum Tag as specified by the NFC Forum. The NFC Forum Tag comprises a counter which is incremented on certain events, for example the NFC Forum Tag selection and Capability Container read events, as specified by the NFC Forum. The NFC Forum Tag further comprises a private key for signing the address SP-URL of the server unit and a secret key shared with the server unit to generate the message authentication code MAC of the counter value C# and the identifier value UID of the NFC Forum Tag.

[0033] The NFC Forum Tag also comprises a NFC Data Exchange Format (NDEF) message. The mandatory NDEF message contains NFC Smart Poster data with the following records:

[0034] SP-URL (Smart Poster Uniform Resource Locator), i.e. a record of the type "U" according to the NFC Record Type Definition, which points to the server unit on the internet, and which incorporates, as parameters of the URL, the NFC Forum Tag's identifier value UID and the current counter value C#, as well as a message authentication code MAC;

[0035] SP-SIG (Smart Poster Signature), i.e. a record of the type "Sig", to sign SP-URL;

[0036] SP-HASH, a hash value generated by hashing the encrypted counter value.

[0037] FIG. 2 illustrates a process of reading an NFC device (in this example the NFC Forum Tag) in order to establish a secure and authenticated communication channel between a mobile device and a server unit in a smart poster system according to the invention. The process comprises steps the following steps. [0038] I. The mobile device (in this example a mobile phone) sends one or more read commands to the NFC Forum Tag in order to initiate a read operation. In particular, the mobile phone requests to read the Smart Poster data on the NFC Forum Tag by using the appropriate commands. [0039] II. In response to the command(s), the NFC Forum Tag generates the NDEF message containing the NFC Smart Poster data with the following records:

[0040] a. SP-URL (Smart Poster Uniform Resource Locator), i.e. a record of the type "U" according to the NFC Record Type Definition, which points at the server unit on the internet, and which incorporates, as parameters of the URL, the NFC Forum Tag's identifier value UID and the current counter value C#, as well as a message authentication code MAC;

[0041] b. SP-SIG (Smart Poster Signature), i.e. a record of the type "Sig", to sign SP-URL;

[0042] c. SP-HASH, a hash value generated by hashing the encrypted counter value. [0043] III. The NFC Forum Tag returns the generated NDEF message to the mobile phone. [0044] IV. The mobile phone verifies SP-URL using SP-SIG and a pre-installed root certificate. Alternatively, a certificate could be retrieved dynamically using a certificate URL. If the verification fails, the NFC Forum Tag is considered to be malicious and the process stops. Otherwise, the process continues with the next step. [0045] V. The mobile phone connects to the server unit on the internet using the verified SP-URL. [0046] VI. The server unit receives the request and verifies it using:

[0047] a. the identifier value UID in order to check whether it can be associated with a known NFC Forum tag;

[0048] b. the counter value C# in order to check whether it is plausible, in that, for example, there is no sudden unexpected change of the counter value which would indicate malicious activity;

[0049] c. the message authentication code MAC in order to check whether the request was generated after reading an authentic and valid NFC Forum Tag to ensure that the NFC Forum Tag was really touched and that the request was not modified by the mobile phone or an interceptor;

[0050] d. its own database in order to check whether the NFC Forum Tag was already marked invalid.

[0051] If any of the checks under (a) to (d) fails, then the server unit will reject the request and the process will stop. Otherwise, the process continues with the next step. [0052] VII. The server unit stores the current counter value and other metadata of the request. [0053] VIII. The server unit and the mobile phone establish a secure communication channel between each other. It will be appreciated that techniques for establishing such a channel are known per se and that the skilled person may select an appropriate one. [0054] IX. The server unit generates an encrypted counter value TOKEN by encrypting the counter value C# using a secret key shared with the NFC Forum Tag. [0055] X. The server unit sends the encrypted counter value TOKEN to the mobile phone via the secure communication channel. [0056] XI. The mobile phone generates a hash of the received encrypted counter value TOKEN and compares it with the hash value SP-HASH generated by the NFC Forum Tag. For this purpose it uses the same hash algorithm as the NFC Forum Tag. Hash algorithms are known per se and need not be elaborated here. If the two hash values are different, the server unit is not authentic, and the mobile phone stops the communication with the server unit. [0057] XII. Otherwise, the secure and authenticated communication channel is available for use.

[0058] The above-mentioned preferred embodiments illustrate rather than limit the invention, and the skilled person will be able to design many alternative embodiments without departing from the scope of the appended claims. In the claims, any reference sign placed between parentheses shall not be construed as limiting the claim. The word "comprise(s)" or "comprising" does not exclude the presence of elements or steps other than those listed in a claim. The word "a" or "an" preceding an element does not exclude the presence of a plurality of such elements. The invention may be implemented by means of hardware comprising several distinct elements and/or by means of a suitably programmed processor. In a device claim enumerating several means, several of these means may be embodied by one and the same item of hardware. The mere fact that certain measures are recited in mutually different dependent claims does not indicate that a combination of these measures cannot be used to advantage.

LIST OF REFERENCE SYMBOLS

[0059] SP-URL address of the server unit [0060] UID identifier value of the NFC device [0061] C# counter value [0062] MAC message authentication code [0063] SP-SIG digital signature [0064] SP-HASH hashed encrypted counter value from the NFC device [0065] TOKEN encrypted counter value from the server unit

* * * * *

References


uspto.report is an independent third-party trademark research tool that is not affiliated, endorsed, or sponsored by the United States Patent and Trademark Office (USPTO) or any other governmental organization. The information provided by uspto.report is based on publicly available data at the time of writing and is intended for informational purposes only.

While we strive to provide accurate and up-to-date information, we do not guarantee the accuracy, completeness, reliability, or suitability of the information displayed on this site. The use of this site is at your own risk. Any reliance you place on such information is therefore strictly at your own risk.

All official trademark data, including owner information, should be verified by visiting the official USPTO website at www.uspto.gov. This site is not intended to replace professional legal advice and should not be used as a substitute for consulting with a legal professional who is knowledgeable about trademark law.

© 2024 USPTO.report | Privacy Policy | Resources | RSS Feed of Trademarks | Trademark Filings Twitter Feed